Images List Premium Download Classic

Reverse Engineering

Reverse Engineering-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Mobile device and method of operating mobile device
May 25, 2017 - N°20170147798

A mobile device and a method of operating a mobile device are disclosed. The mobile device includes a main processor executing a normal code of a mobile application program, a co-processor executing a core code of the mobile application program, and a co-processor driver enabling the main processor and the co-processor to communicate with each other. The normal code includes ...
Semiconductor device having features to prevent reverse engineering
Verisiti, Inc.
April 27, 2017 - N°20170117234

An electronic device includes: a base layer; a first layer located at least partially over the base layer; a second layer located at least partially over the first layer; a first metal layer located at least partially over the second layer, wherein one or more signal outputs of the electronic device are formed in the first metal layer; and a ...
System and method for ip fingerprinting and ip dna analysis
Ipextreme, Inc.
April 13, 2017 - N°20170103079

Embodiments disclosed include computer implemented systems and methods comprising multiple computer programs that when used together as part of the system enable the detection of one set of computer files within another set of files without having direct access to the files themselves. A computer program generated unique fingerprint for each set of files that is a condensed representation of ...
Reverse Engineering Patent Pack
Download + patent application PDFs
Reverse Engineering Patent Applications
Download + Reverse Engineering-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Reverse Engineering-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and ...
Syphermedia International, Inc.
March 30, 2017 - N°20170091368

A method and apparatus for camouflaging an application specific integrated circuit (asic), wherein the asic comprises a plurality of interconnected functional logic is disclosed. The method adds functionally inert elements to the logical description or provides alternative definitions of standard logical cells to make it difficult for reverse engineering programs to be used to discover the circuit's function. Additionally, post ...
Semiconductor chip with anti-reverse engineering function
International Business Machines Corporation
March 23, 2017 - N°20170084552

A structure and a method. The structure includes a semiconductor substrate; a stack of wiring levels from a first wiring level to a last wiring level, the first wiring level closest to the semiconductor substrate and the last wiring level furthest from the semiconductor substrate, the stack of wiring levels including an intermediate wiring level between the first wiring level ...
Semiconductor device having features to prevent reverse engineering
Verisiti, Inc.
March 02, 2017 - N°20170062425

It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques. The disclosed device uses devices having the same geometry but different voltage levels to create different logic devices. Alternatively, the ...
Reverse Engineering Patent Pack
Download + patent application PDFs
Reverse Engineering Patent Applications
Download + Reverse Engineering-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Reverse Engineering-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Two plasmid mammalian expression system
Tectonic Labs, Llc
February 02, 2017 - N°20170029786

Reverse engineering has offered new ways of studying the pathology of rna viral infections, new more efficient devices of synthesizing recombinant viruses and developing vaccines and also demonstrated the versatility and efficiency of rna dependent rna polymerase rdrp system as an expression system. However, the currently used methods require a repertoire of complex, difficult-to-use tools. Present invention describes, a simpler ...
Systems and methods for authentication based on physically unclonable functions
Maxim Integrated Products, Inc.
January 05, 2017 - N°20170005811

Presented are systems, devices, and methods for reliably authenticating asymmetric cryptography-based ics based on physically unclonable functions (pufs) that are immune to reverse engineering. Various embodiments of the invention enhance the level of security in ic architectures without the need to connect to a remote certification authority, thereby, eliminating shortfalls associated with online authentication. Certain embodiments accomplish this by using ...
Code obfuscation device using indistinguishable identifier conversion and method thereof
Soongsil University Research Consortium Techno-park
December 22, 2016 - N°20160371473

A code obfuscation device and a method of obfuscating a code of an application program file are disclosed. The code obfuscation device includes an extraction circuit uncompressing an application program file to extract a dalvik executable file, a code analysis circuit analyzing a bytecode of the dalvik executable file, a control circuit determining an obfuscation character and a number and ...
Apparatus and method for managing unity file in a mobile platform
Seworks, Inc.
November 17, 2016 - N°20160335422

The present invention relates to managing a unity file in a mobile platform in order to forestall a unity library executable in a mobile platform from being analyzed by reverse engineering and decompiling and provides an apparatus for managing a unity file in a mobile platform comprising a file extracting section that extracts a unity library file from a unity ...
Exploiting the scan test interface for reverse engineering of a vlsi device
Technion Research & Development Foundation Limited
November 10, 2016 - N°20160328509

A computerized method of creating a circuit logic model of a vlsi device, comprising mapping a plurality of logic function patterns of one or more circuits of a vlsi device through a plurality of probe iterations and generating a circuit logic model of the circuit(s) by reconstructing a logical function of a combinatorial logic of the circuit(s) based ...
Automated identification and reverse engineering of malware
Los Alamos National Security, Llc
October 20, 2016 - N°20160306971

An automated malware identification and reverse engineering tool is provided. Subroutine categories may be learned by machine learning. A program may then be reverse-engineered and classified, and subroutines that are potentially indicative of malware may be identified. These subroutines may be reviewed by a reverse engineer to determine whether the program is malware in a more directed and efficient manner.
System, method and computer-accessible medium for security-centric electronic system design
New York University
October 20, 2016 - N°20160306902

An exemplary system, method and computer-accessible medium can be provided which can include, for example, generating a super control dataflow graph(s) (cdfg) by applying a plurality of electronic system level esl design constraints associated with an integrated circuit, determining an upper bound(s) number and a lower bound(s) number based on a number of cdfgs in the super ...
Reverse Engineering Patent Pack
Download + patent application PDFs
Reverse Engineering Patent Applications
Download + Reverse Engineering-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Reverse Engineering-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
User terminal and method for protecting core codes of applications using the same
Soongsil University Research Consortium Techno-park
August 18, 2016 - N°20160239669

A user terminal includes a communication circuit, an encryption-decryption circuit, and an execution circuit. The communication circuit receives a core code file of an application from a peripheral device, which stores the core code file of the application, when certifying a core code of the application. The encryption-decryption circuit encrypts the core code file and transmits the encrypted core code ...
Systems and methods of processing data associated with detection and/or handling of malware
Mcafee Ireland Holdings Limited
July 07, 2016 - N°20160196431

The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing ...
Secure app update server and secure application programming interface ("api") server
Shape Security, Inc.
June 09, 2016 - N°20160162688

A coupled set of servers in a server system protect an application programming interface (“api”) from unwanted automation facilitated by unauthorized reverse engineering of an endpoint app or communications channel used by the endpoint app. The server system comprises at least one secure app update server that transforms an app code object received from an enterprise ...
Media client device authentication using hardware root of trust
Azuki Systems, Inc.
June 09, 2016 - N°20160162669

A client device for media playback includes a user-installable media client application which implements the client-side of a digital rights management (drm) system. The client device employs secure boot and verifies the user-installed application. The application is hardened against reverse engineering, and it utilizes a special api provided by the client device to tie into the secure boot, bridging the ...
Apparatus and method for managing apk file in an android platform
Seworks, Inc.
May 12, 2016 - N°20160132547

The present invention relates to an apparatus for managing an apk file in the android platform in order to forestall an executable file in an apk file from being analyzed by reverse engineering or decompiling that comprises a file reader that reads an original . Dex file in the apk file, a file modifier that modifies the original . Dex file the ...
Visual tool for reverse engineering software components
General Motors Llc
May 12, 2016 - N°20160132327

A system and method of displaying a software application using a software architecture tool that includes: receiving a portion of an existing software application at the software architecture tool; identifying one or more software components of the existing software application from the received portion; automatically identifying a tier and layer location for each standard software component; and presenting one or ...
Systems and methods for enhancing confidentiality via logic gate encryption
Maxim Integrated Products, Inc.
April 07, 2016 - N°20160099714

Presented are systems and methods that allow hardware designers to protect valuable ip and information in the hardware domain in order to increase overall system security. In various embodiments of the invention this is accomplished by configuring logic gates of existing logic circuitry based on a key input. In certain embodiments, a logic function provides results that are dependent not ...
Semiconductor device having features to prevent reverse engineering
Secure Silicon Layer, Inc.
April 07, 2016 - N°20160099219

It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques. The disclosed device uses devices having the same geometry but different voltage levels to create different logic devices. Alternatively, the ...
Loading